{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:54:21Z","timestamp":1729619661554,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,4]]},"DOI":"10.1109\/cscwd.2007.4281548","type":"proceedings-article","created":{"date-parts":[[2007,8,8]],"date-time":"2007-08-08T15:59:31Z","timestamp":1186588771000},"page":"852-857","source":"Crossref","is-referenced-by-count":1,"title":["An Access Control Model for Service Composite"],"prefix":"10.1109","author":[{"given":"Gaofeng","family":"Ji","sequence":"first","affiliation":[]},{"given":"Yong","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Guibin","family":"Wu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Database Security X Status and Prospects","article-title":"Task-Based Authorization Controls (TBAC): Models for Active and Enterprise-oriented Authorization Management","year":"1997","author":"thomas","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/501983.501992"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/775412.775421"},{"journal-title":"Web Services Security Specification","year":"2002","author":"atkinson","key":"ref13"},{"journal-title":"Workflow Management Models Methods and Systems","year":"2002","author":"van der aalst","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/11811220_13"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ENABL.2004.9"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/344287.344298"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/373256.373294"},{"key":"ref8","article-title":"A Rule-Based Framework for Role-Based Delgation and Revocation","volume":"6","author":"zhang","year":"2003","journal-title":"ACM Transactions on Information and System Security(TISSEC)"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1145\/373256.373258","article-title":"Securing Context-aware Applications Using Environment Roles","author":"convington","year":"2001","journal-title":"ACM Symposium on Access Control Models and Technologies"},{"key":"ref2","first-page":"76","article-title":"Task-Based Access Control Model","volume":"14","author":"deng","year":"2003","journal-title":"Journal of Software"},{"article-title":"Business Process Execution Language for Web Services, Version 1.1. Specification, BEA Systems","year":"2003","author":"andrews","key":"ref1"},{"journal-title":"Proceedings of the IFIP Database Security Conference","article-title":"Task-Based Authorization Controls (TBAC): A Family of Models for active and enterprise-oriented authorization management","year":"1997","author":"thomas","key":"ref9"}],"event":{"name":"2007 11th International Conference on Computer Supported Cooperative Work in Design","start":{"date-parts":[[2007,4,26]]},"location":"Melbourne, Australia","end":{"date-parts":[[2007,4,28]]}},"container-title":["2007 11th International Conference on Computer Supported Cooperative Work in Design"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4281389\/4281390\/04281548.pdf?arnumber=4281548","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,17]],"date-time":"2024-02-17T09:01:50Z","timestamp":1708160510000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4281548\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,4]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/cscwd.2007.4281548","relation":{},"subject":[],"published":{"date-parts":[[2007,4]]}}}